A lightweight dual authentication scheme for V2V communication in 6G-based vanets

Xia Feng , Yaru Wang , Kaiping Cui , Liangmin Wang

›› 2025, Vol. 11 ›› Issue (4) : 1225 -1236.

PDF
›› 2025, Vol. 11 ›› Issue (4) :1225 -1236. DOI: 10.1016/j.dcan.2024.12.005
Research article
research-article

A lightweight dual authentication scheme for V2V communication in 6G-based vanets

Author information +
History +
PDF

Abstract

The advancement of 6G wireless communication technology has facilitated the integration of Vehicular Ad-hoc Networks (VANETs). However, the messages transmitted over the public channel in the open and dynamic VANETs are vulnerable to malicious attacks. Although numerous researchers have proposed authentication schemes to enhance the security of Vehicle-to-Vehicle (V2V) communication, most existing methodologies face two significant challenges: (1) the majority of the schemes are not lightweight enough to support real-time message interaction among vehicles; (2) the sensitive information like identity and position is at risk of being compromised. To tackle these issues, we propose a lightweight dual authentication protocol for V2V communication based on Physical Unclonable Function (PUF). The proposed scheme accomplishes dual authentication between vehicles by the combination of Zero-Knowledge Proof (ZKP) and MASK function. The security analysis proves that our scheme provides both anonymous authentication and information unlinkability. Additionally, the performance analysis demonstrates that the computation overhead of our scheme is approximately reduced 23.4% compared to the state-of-the-art schemes. The practical simulation conducted in a 6G network environment demonstrates the feasibility of 6G-based VANETs and their potential for future advancements.

Keywords

Vehicular ad-hoc network / Identity authentication / Physical unclonable function / 𝑀𝐴𝑆𝐾 function / Zero-knowledge proof / 6G wireless communication technology

Cite this article

Download citation ▾
Xia Feng, Yaru Wang, Kaiping Cui, Liangmin Wang. A lightweight dual authentication scheme for V2V communication in 6G-based vanets. , 2025, 11(4): 1225-1236 DOI:10.1016/j.dcan.2024.12.005

登录浏览全文

4963

注册一个新账户 忘记密码

References

[1]

P. Vijayakumar, M. Azees, S.A. Kozlov, J.J. Rodrigues, An anonymous batch au-thentication and key exchange protocols for 6 g enabled vanets, IEEE Trans. Intell. Transp. Syst. 23 (2) (2021) 1630-1638.

[2]

G. Cheng, J. Huang, Y. Wang, J. Zhao, L. Kong, S. Deng, X. Yan, Conditional privacy-preserving multi-domain authentication and pseudonym management for 6 g-enabled iov, IEEE Trans. Inf. Forensics Secur. 19 (2024) 10206-10220.

[3]

H. Xu, P.V. Klaine, O. Onireti, B. Cao, M. Imran, L. Zhang, Blockchain-enabled re-source management and sharing for 6 g communications, Digit.commun. Netw. 6 (3) (2020) 261-269.

[4]

B. Rong, 6 g: the next horizon: from connected people and things to connected in-telligence, IEEE Wirel. Commun. 28 (5) (2021) 8, https://doi.org/10.1109/MWC.2021.9615100.

[5]

K. Shah, S. Chadotra, S. Tanwar, R. Gupta, N. Kumar, Blockchain for iov in 6 g envi-ronment: review solutions and challenges, Clust.comput. 25 (3) (2022) 1927-1955.

[6]

M. Wang, T. Zhu, T. Zhang, J. Zhang, S. Yu, W. Zhou, Security and privacy in 6 g net-works: new areas and new challenges, Digit.commun. Netw. 6 (3) (2020) 281-291.

[7]

B. Brecht, D. Therriault, A. Weimerskirch, W. Whyte, V. Kumar, T. Hehn, R. Goudy, A security credential management system for v2x communications, IEEE Trans. In-tell. Transp. Syst. 19 (12) (2018) 3850-3871.

[8]

S.F. Tzeng, S.J. Horng, T. Li, X. Wang, P.-H. Huang, M.K. Khan, Enhancing security and privacy for identity-based batch verification scheme in vanets, IEEE Trans. Veh. Technol. 66 (4) (2015) 3235-3248.

[9]

D. Tiwari, M. Bhushan, A. Yadav, S. Jain,A novel secure authentication scheme for vanets, in:2016 Second International Conference on Computational Intelligence & Communication Technology (CICT), 2016, pp. 287-297.

[10]

M. Ma, D. He, H. Wang, N. Kumar, K.-K.R. Choo, An efficient and provably secure authenticated key agreement protocol for fog-based vehicular ad-hoc networks, IEEE Internet Things J. 6 (5) (2019) 8065-8075.

[11]

Y. Liu, Y. Wang, G. Chang, Efficient privacy-preserving dual authentication and key agreement scheme for secure v2v communications in an iov paradigm, IEEE Trans. Intell. Transp. Syst. 18 (10) (2017) 2740-2749.

[12]

A. Imghoure, F. Omary, A. El-Yahyaoui, Schnorr-based conditional privacy-preserving authentication scheme with multisignature and batch verification in vanet, Internet of Things 23 (2023) 100850.

[13]

X. Liu, Y. Wang, Y. Li, H. Cao, Ptap: a novel secure privacy-preserving & traceable authentication protocol in vanets, Comput. Netw. 226 (2023) 109643.

[14]

H. Vasudev, V. Deshpande, D. Das, S.K. Das, A lightweight mutual authentication protocol for v2v communication in Internet of vehicles, IEEE Trans. Veh. Technol. 69 (6) (2020) 6709-6717.

[15]

Y.N. Liu, S.Z. Lv, M. Xie, Z.B. Chen, P. Wang, Dynamic anonymous identity authen-tication (daia) scheme for vanet, Int. J.commun. Syst. 32 (5) (2019) e3892.

[16]

U. Javaid, M.N. Aman, B. Sikdar, A scalable protocol for driving trust manage-ment in Internet of vehicles with blockchain, IEEE Internet Things J. 7 (12) (2020) 11815-11829.

[17]

I. Rasheed, L. Zhang, F. Hu, A privacy preserving scheme for vehicle-to-everything communications using 5 g mobile edge computing, Comput. Netw. 176 (2020) 107283.

[18]

X. Feng, Q. Shi, Q. Xie, L. Wang, P2ba: a privacy-preserving protocol with batch authentication against semi-trusted rsus in vehicular ad hoc networks, IEEE Trans. Inf. Forensics Secur. 16 (2021) 3888-3899.

[19]

Z. Liu, L. Wan, J. Guo, F. Huang, X. Feng, L. Wang, J. Ma, Ppru: a privacy-preserving reputation updating scheme for cloud-assisted vehicular networks, IEEE Trans. Veh. Technol. (2023) 1-16.

[20]

Y. Liang, E. Luo, Y. Liu, Physically secure and conditional-privacy authenticated key agreement for vanets, IEEE Trans. Veh. Technol. 72 (6) (2023) 7914-7925.

[21]

U. Chatterjee, V. Govindan, R. Sadhukhan, D. Mukhopadhyay, R.S. Chakraborty, D. Mahata, M.M. Prabhu, Building puf based authentication and key exchange protocol for iot without explicit crps in verifier database, IEEE Trans. Dependable Secure Comput. 16 (3) (2018) 424-437.

[22]

P. Gope, O. Millwood, B. Sikdar, A scalable protocol level approach to prevent machine learning attacks on physically unclonable function based authentication mechanisms for Internet of medical things, IEEE Trans. Ind. Inform. 18 (3) (2021) 1971-1980.

[23]

Y. Zheng, W. Liu, C. Gu, C.-H. Chang, Puf-based mutual authentication and key ex-change protocol for peer-to-peer iot applications, IEEE Trans. Dependable Secure Comput. 20 (4) (2022) 3299-3316.

[24]

Q. Jiang, X. Zhang, N. Zhang, Y. Tian, X. Ma, J. Ma, Two-factor authentication pro-tocol using physical unclonable function for iov, in: 2019 IEEE/CIC International Conference on Communications in China (ICCC), IEEE, 2019, pp. 195-200.

[25]

Q. Jiang, X. Zhang, N. Zhang, Y. Tian, X. Ma, J. Ma, Three-factor authentication protocol using physical unclonable function for iov, Comput.commun. 173 (2021) 45-55.

[26]

M.N. Aman, U. Javaid, B. Sikdar, A privacy-preserving and scalable authentication protocol for the Internet of vehicles, IEEE Internet Things J. 8 (2) (2020) 1123-1139.

[27]

Q. Xie, Z. Ding, P. Zheng, Provably secure and anonymous v2i and v2v authentication protocol for vanets, IEEE Trans. Intell. Transp. Syst. 24 (7) (2023) 7318-7327.

[28]

K.P. Satamraju, B. Malarkodi, A puf-based mutual authentication protocol for Inter-net of things, in: 2020 5th International Conference on Computing, Communication and Security (ICCCS), IEEE, 2020, pp. 1-6.

[29]

M.A. Qureshi, A. Munir, Puf-rake: a puf-based robust and lightweight authentica-tion and key establishment protocol, IEEE Trans. Dependable Secure Comput. 19 (4) (2021) 2457-2475.

[30]

T.K. Hazra, R. Ghosh, S. Kumar, S. Dutta, A.K. Chakraborty, File encryption using Fisher-Yates shuffle, in: 2015 International Conference and Workshop on Computing and Communication (IEMCON), IEEE, 2015, pp. 1-7.

[31]

A. Mohr, A Survey of Zero-Knowledge Proofs with Applications to Cryptography, Southern Illinois University, Carbondale, 2007, pp. 1-12.

[32]

R. Canetti, H. Krawczyk, Universally composable notions of key exchange and secure channels, in: Advances in Cryptology—EUROCRYPT 2002: International Confer-ence on the Theory and Applications of Cryptographic Techniques Amsterdam, the Netherlands, April 28-May 2, 2002 Proceedings 21, Springer, 2002, pp. 337-351.

[33]

K.A. Yadav, P. Vijayakumar, Lppsa: an efficient lightweight privacy-preserving signature-based authentication protocol for a vehicular ad hoc network, Ann. Télé-commun. 77 (7) (2022) 473-489.

[34]

M. Umar, S.H. Islam, K. Mahmood, S. Ahmed, Z. Ghaffar, M.A. Saleem, Provable secure identity-based anonymous and privacy-preserving inter-vehicular authenti-cation protocol for vanets using puf, IEEE Trans. Veh. Technol. 70 (11) (2021) 12158-12167.

[35]

M. Coudron, S. Secci, An implementation of multipath tcp in ns3, Comput. Netw. 116 (2017) 1-11.

AI Summary AI Mindmap
PDF

202

Accesses

0

Citation

Detail

Sections
Recommended

AI思维导图

/